Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Private Authentication Martin Abadi
 

Summary: Private Authentication
Mart´in Abadi
University of California at Santa Cruz
C´edric Fournet
Microsoft Research
Abstract
Frequently, communication between two principals reveals their identities and pres-
ence to third parties. These privacy breaches can occur even if security protocols are
in use; indeed, they may even be caused by security protocols. However, with some
care, security protocols can provide authentication for principals that wish to com-
municate while protecting them from monitoring by third parties. We discuss the
problem of private authentication and present two protocols for private authentica-
tion of mobile principals. Our protocols allow two mobile principals to communicate
when they meet at a location if they wish to do so, without the danger of tracking by
third parties. We also present the analysis of one of the protocols in the applied pi
calculus. We establish authenticity and secrecy properties. Although such properties
are fairly standard, their formulation in the applied pi calculus makes an original
use of process equivalences. In addition, we treat identity-protection properties, thus
exploring a formal model of privacy.
1 Privacy, authenticity, and the applied pi calculus

  

Source: Abadi, Martín - Department of Computer Science, University of California at Santa Cruz

 

Collections: Computer Technologies and Information Sciences